General
-
Target
fb443788071b8fc083b27ba083915194ba84a984b98ea75411d651669cf04b68
-
Size
658KB
-
Sample
230403-yyfnzagh89
-
MD5
3982bf8b268bbf5358be76c389c9b602
-
SHA1
3201ebd49693faa7d9de8eb84e07d3c2c00bcc93
-
SHA256
fb443788071b8fc083b27ba083915194ba84a984b98ea75411d651669cf04b68
-
SHA512
63f380554ce22d101333ebbc77942607cf04345caeae00dd749ce900e1a94946996a6fd7ccf7a522f1824ea8d1271c1377f853da4f7cb632dc2b274162655420
-
SSDEEP
12288:4Mr0y90AqNI+1tMYZsq04ttedgQt7X4nAE444NzWK1p8vVXnWbfP:MyV07xtYttL4AER4QKQnKP
Static task
static1
Behavioral task
behavioral1
Sample
fb443788071b8fc083b27ba083915194ba84a984b98ea75411d651669cf04b68.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
fb443788071b8fc083b27ba083915194ba84a984b98ea75411d651669cf04b68
-
Size
658KB
-
MD5
3982bf8b268bbf5358be76c389c9b602
-
SHA1
3201ebd49693faa7d9de8eb84e07d3c2c00bcc93
-
SHA256
fb443788071b8fc083b27ba083915194ba84a984b98ea75411d651669cf04b68
-
SHA512
63f380554ce22d101333ebbc77942607cf04345caeae00dd749ce900e1a94946996a6fd7ccf7a522f1824ea8d1271c1377f853da4f7cb632dc2b274162655420
-
SSDEEP
12288:4Mr0y90AqNI+1tMYZsq04ttedgQt7X4nAE444NzWK1p8vVXnWbfP:MyV07xtYttL4AER4QKQnKP
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-